Network steganography based security framework for cyber-physical systems
DOI10.1016/J.INS.2022.07.081MaRDI QIDQ6203495FDOQ6203495
Xiu-Xiu Ren, Xiaoguang Zhang, Guang-Hong Yang
Publication date: 27 March 2024
Published in: Information Sciences (Search for Journal in Brave)
cyber-physical systemsattack detectioncovert channeleavesdropping attack defensenetwork steganography
Filtering in stochastic control theory (93E11) Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Estimation and detection in stochastic control theory (93E10) Computer security (68M25)
Cites Work
- Title not available (Why is that?)
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach
- On Autocovariance Least-Squares Method for Noise Covariance Matrices Estimation
- Optimal Linear Cyber-Attack on Remote State Estimation
- State estimation under false data injection attacks: security analysis and system protection
- Worst-case stealthy innovation-based linear attack on remote state estimation
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure
- Title not available (Why is that?)
- Adaptive control for nonlinear cyber‐physical systems under false data injection attacks through sensor networks
- Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper
- Remote State Estimation in the Presence of an Active Eavesdropper
- Optimal sensor attacks in cyber-physical systems with round-robin protocol
- A dynamic event-triggered resilient control approach to cyber-physical systems under asynchronous DoS attacks
- An Attack-Resilient Pulse-Based Synchronization Strategy for General Connected Topologies
- State-Secrecy Codes for Networked Linear Systems
- A Moving Target Defense for Securing Cyber-Physical Systems
- Global Synchronization of Pulse-Coupled Oscillator Networks Under Byzantine Attacks
This page was built for publication: Network steganography based security framework for cyber-physical systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6203495)